/packages/modules/Wifi/service/ |
D | wifi.rc | 24 # Below are for kernel tracing related stuff. 30 mkdir /sys/kernel/debug/tracing/instances/wifi 711 31 restorecon_recursive /sys/kernel/debug/tracing/instances/wifi 32 write /sys/kernel/debug/tracing/instances/wifi/tracing_on 0 33 write /sys/kernel/debug/tracing/instances/wifi/buffer_size_kb 1 34 write /sys/kernel/debug/tracing/instances/wifi/trace_options disable_on_free 36 mkdir /sys/kernel/tracing/instances/wifi 711 37 restorecon_recursive /sys/kernel/tracing/instances/wifi 38 write /sys/kernel/tracing/instances/wifi/tracing_on 0 39 write /sys/kernel/tracing/instances/wifi/buffer_size_kb 1 [all …]
|
/packages/modules/Virtualization/guest/pvmfw/avb/tests/ |
D | api_test.rs | 242 let mut kernel = load_latest_signed_kernel()?; in tampered_kernel_fails_verification() localVariable 243 kernel[1] = !kernel[1]; // Flip the bits in tampered_kernel_fails_verification() 246 &kernel, in tampered_kernel_fails_verification() 255 let kernel = fs::read(TEST_IMG_WITH_NAME_PATH).unwrap(); in kernel_has_expected_valid_name() localVariable 256 assert_eq!(read_name(&kernel), Ok(Some("test_vm_name".to_owned()))); in kernel_has_expected_valid_name() 261 let kernel = fs::read(TEST_IMG_WITH_ONE_HASHDESC_PATH).unwrap(); in kernel_has_expected_missing_name() localVariable 262 assert_eq!(read_name(&kernel), Ok(None)); in kernel_has_expected_missing_name() 267 let kernel = fs::read(TEST_IMG_WITH_INVALID_PAGE_SIZE_PATH).unwrap(); in kernel_has_expected_page_size_invalid() localVariable 268 assert_eq!(read_page_size(&kernel), Err(PvmfwVerifyError::InvalidPageSize)); in kernel_has_expected_page_size_invalid() 273 let kernel = fs::read(TEST_IMG_WITH_NEGATIVE_PAGE_SIZE_PATH).unwrap(); in kernel_has_expected_page_size_negative() localVariable [all …]
|
D | utils.rs | 43 kernel: &[u8], in assert_payload_verification_with_initrd_fails() 48 assert_payload_verification_fails(kernel, Some(initrd), trusted_public_key, expected_error) in assert_payload_verification_with_initrd_fails() 52 kernel: &[u8], in assert_payload_verification_fails() 57 assert_eq!(expected_error, verify_payload(kernel, initrd, trusted_public_key).unwrap_err()); in assert_payload_verification_fails() 87 pub fn extract_avb_footer(kernel: &[u8]) -> Result<AvbFooter> { in extract_avb_footer() 88 let footer_start = get_avb_footer_offset(kernel)?; in extract_avb_footer() 91 transmute::<[u8; size_of::<AvbFooter>()], AvbFooter>(kernel[footer_start..].try_into()?) in extract_avb_footer() 100 pub fn extract_vbmeta_header(kernel: &[u8], footer: &AvbFooter) -> Result<AvbVBMetaImageHeader> { in extract_vbmeta_header() 103 let vbmeta_src = &kernel[vbmeta_offset..(vbmeta_offset + vbmeta_size)]; in extract_vbmeta_header() 121 let kernel = load_latest_signed_kernel()?; in assert_latest_payload_verification_passes() localVariable [all …]
|
/packages/modules/Virtualization/guest/kernel/ |
D | README.md | 1 # Microdroid kernel 3 This directory contains prebuilt images of the Linux kernel that is used in 4 Microdroid. The kernel is built from the same source tree as Generic Kernel 6 turned off to make the kernel fast & slim. 13 repo init -u https://android.googlesource.com/kernel/manifest -b common-android15-6.6 32 [`--config=fast`](https://android.googlesource.com/kernel/build/+/refs/heads/main/kleaf/docs/fast.m… 38 ### Change the kernel configs 50 ## How to update Microdroid kernel prebuilts 54 Copy the built kernel image to the Android source tree directly, and build the virt APEX. 58 …mage <android_checkout>/packages/modules/Virtualization/guest/kernel/android15-6.6/arm64/kernel-6.6 [all …]
|
D | Android.bp | 33 "android15_66": ["android15-6.6/arm64/kernel-6.6"], 34 "android16_612": ["android16-6.12/arm64/kernel-6.12"], 43 "android15_66": ["android15-6.6/x86_64/kernel-6.6"], 44 "android16_612": ["android16-6.12/x86_64/kernel-6.12"], 53 "android15_66": ["android15-6.6/arm64/16k/kernel-6.6"], 54 "android16_612": ["android16-6.12/arm64/16k/kernel-6.12"],
|
/packages/modules/Virtualization/docs/debug/ |
D | gdb_kernel.md | 5 Starting with Android U it is possible to attach a gdb to the guest kernel, when 29 The [kernel documentation]( 30 https://www.kernel.org/doc/html/latest/dev-tools/gdb-kernel-debugging.html) has 31 some general techniques on how to debug kernel with gdb. 35 If you are debugging Microdroid kernel that you have built [locally]( 36 ../../build/microdroid/kernel/README.md), then look for `out/dist/vmlinux` in your 37 kernel repository. 39 If you are debugging Microdroid kernel bundled with the `com.android.virt` APEX, 40 then you need to obtain the build ID of this kernel. You can do this by 42 `packages/modules/Virtualization/build/microdroid/kernel/arm64` or [all …]
|
D | ramdump.md | 3 A debuggable Microdroid VM creates a RAM dump of itself when the kernel panics. This 8 RAM dump is created automatically when there's a kernel panic. However, for 18 crashdump kernel is executed. 32 [ 14.998693][ T148] Starting crashdump kernel... 47 reboot: Restarting system with command 'kernel panic' 82 You also need the image of the kernel binary with debuggin enabled. The kernel 83 binary should be the same as the actual kernel that you used in the Microdroid 84 VM that crashed. To identify which kernel it was, look for the kernel version 94 of the kernel. 99 DON'T forget to replace `9013362` with the actual build ID of the kernel you used. [all …]
|
/packages/modules/Virtualization/guest/trusty/security_vm/launcher/src/ |
D | main.rs | 34 kernel: PathBuf, field 76 let kernel = in main() localVariable 77 File::open(&args.kernel).with_context(|| format!("Failed to open {:?}", &args.kernel))?; in main() 78 let kernel = ParcelFileDescriptor::new(kernel); in main() localVariable 81 let (kernel, bootloader) = in main() 82 if args.load_kernel_as_bootloader { (None, Some(kernel)) } else { (Some(kernel), None) }; in main() 86 kernel, in main()
|
/packages/modules/Virtualization/tests/early_vm_test/src/ |
D | main.rs | 41 kernel: PathBuf, field 78 let kernel = in main() localVariable 79 File::open(&args.kernel).with_context(|| format!("Failed to open {:?}", &args.kernel))?; in main() 80 let kernel = ParcelFileDescriptor::new(kernel); in main() localVariable 84 kernel: Some(kernel), in main()
|
/packages/modules/Virtualization/guest/pvmfw/src/ |
D | memory.rs | 32 pub kernel: &'a [u8], field 38 pub fn new(fdt: usize, kernel: usize, kernel_size: usize) -> Result<Self, RebootReason> { in new() 73 (kernel, kernel_size) in new() 88 let kernel = kernel_start as *const u8; in new() localVariable 90 let kernel = unsafe { slice::from_raw_parts(kernel, kernel_size.into()) }; in new() localVariable 117 Ok(Self { fdt: untrusted_fdt, kernel, ramdisk, dice_handover }) in new()
|
D | entry.rs | 140 slices.kernel, in main_wrapper() 165 let next_stage = select_next_stage(slices.kernel, keep_uart); in main_wrapper() 170 fn select_next_stage(kernel: &[u8], keep_uart: bool) -> NextStage { in select_next_stage() 172 NextStage::LinuxBootWithUart(kernel.as_ptr() as _) in select_next_stage() 174 NextStage::LinuxBoot(kernel.as_ptr() as _) in select_next_stage()
|
/packages/modules/Virtualization/guest/pvmfw/avb/src/ |
D | verify.rs | 164 kernel: &'a HashDescriptor<'a>, field 173 let mut kernel = None; in get() localVariable 187 PartitionName::Kernel => &mut kernel, in get() 201 kernel: kernel.ok_or(DescriptorError::InvalidContents)?, in get() 272 kernel: &[u8], in verify_payload() 276 let payload = Payload::new(kernel, initrd, trusted_public_key); in verify_payload() 298 kernel_digest: copy_digest(hash_descriptors.kernel)?, in verify_payload() 320 kernel_digest: copy_digest(hash_descriptors.kernel)?, in verify_payload()
|
D | ops.rs | 25 kernel: &'a [u8], field 32 kernel: &'a [u8], in new() 36 Self { kernel, initrd, trusted_public_key } in new() 41 PartitionName::Kernel => Ok(self.kernel), in get_partition()
|
/packages/modules/Virtualization/libs/libservice_vm_requests/src/ |
D | client_vm.rs | 210 kernel: &DiceChainEntryPayload, in validate_kernel_authority_hash() 213 if expected_kernel_authority_hash(service_vm_entry)? == kernel.authority_hash { in validate_kernel_authority_hash() 224 let kernel = dice_chain.microdroid_kernel(); in validate_kernel_code_hash() localVariable 225 if matches_any_kernel_code_hash(&kernel.code_hash, /* is_debug= */ false)? { in validate_kernel_code_hash() 228 if matches_any_kernel_code_hash(&kernel.code_hash, /* is_debug= */ true)? { in validate_kernel_code_hash() 242 code_hash[0..KERNEL_HASH_SIZE].copy_from_slice(&os_hash.kernel); in matches_any_kernel_code_hash()
|
/packages/modules/Virtualization/docs/ |
D | custom_vm.md | 13 "kernel": "/data/local/tmp/kernel", 19 adb push <kernel> /data/local/tmp/kernel
|
D | hugepages.md | 4 Linux feature which allows the kernel to allocate, when possible, a huge-page 23 /sys/kernel/mm/transparent_hugepages/shmem_enabled 33 /sys/kernel/mm/transparent_hugepages/defrag 40 [admin guide](https://docs.kernel.org/admin-guide/mm/transhuge.html).
|
D | microdroid_vendor_modules.md | 4 vendor-prodived kernel modules. This feature is part of the bigger 7 The vendor kernel modules should be packaged inside a `microdroid-vendor.img` 19 VM with GKI as guest kernel. This is **required** when launching a Microdroid VM with 20 vendor provided kernel modules. 151 ## GKI as Microdroid guest kernel 153 In order to enable running Microdroid with GKI as guest kernel, specify the 165 guest kernel:
|
/packages/modules/Virtualization/libs/vmconfig/src/ |
D | lib.rs | 45 pub kernel: Option<PathBuf>, field 81 if self.bootloader.is_none() && self.kernel.is_none() { in validate() 84 if self.bootloader.is_some() && (self.kernel.is_some() || self.initrd.is_some()) { in validate() 120 kernel: maybe_open_parcel_file(&self.kernel, false)?, in to_parcelable()
|
/packages/modules/adb/docs/dev/ |
D | incremental-install.md | 44 oblivious of the background streaming. Everything is done at the Android kernel 46 received yet, the kernel issues a block request to get it from the streaming 57 The rest of the app verification is done by the Android kernel for each block level 72 it to the Android kernel. The kernel is in charge of verifying the integrity 103 It allows the kernel to issue block requests. The arg format to describe the `IS` 112 - `file_id` is the identified that will be used by the kernel for block
|
/packages/modules/Virtualization/guest/pvmfw/avb/fuzz/ |
D | without_footer_verify_fuzzer.rs | 21 fuzz_target!(|kernel: &[u8]| { 27 let _ = verify_payload(kernel, /* initrd= */ None, &[0u8; 64]);
|
/packages/modules/Virtualization/guest/kdump/kernel/ |
D | Android.bp | 18 src: "arm64/kernel-5.15", 21 src: "x86_64/kernel-5.15",
|
/packages/modules/Virtualization/build/microdroid/ |
D | bootconfig.normal | 5 kernel.printk.devkmsg=off 6 kernel.console=ttynull
|
D | bootconfig.debuggable | 5 kernel.printk.devkmsg=on 6 kernel.console=hvc0
|
/packages/services/Car/car_product/sepolicy/private/ |
D | property.te | 4 # Only kernel, init, and vendor init can write to car_boot_prop properties 5 neverallow { domain -kernel -init -vendor_init } car_boot_prop:property_service set;
|
/packages/modules/Virtualization/guest/pvmfw/ |
D | README.md | 49 Otherwise, it hands over the pVM to the guest kernel by jumping to its first 81 image (recorded in the `kernel_size` field), as it already does for the kernel 336 [dice-dt]: https://www.kernel.org/doc/Documentation/devicetree/bindings/reserved-memory/google%2Cop… 404 - the kernel in the `/config` DT node _e.g._ 409 kernel-address = <0x80200000>; 410 kernel-size = <0x1000000>; 426 [Linux ABI]: https://www.kernel.org/doc/Documentation/arm64/booting.txt 430 After verifying the guest kernel, pvmfw boots it using the Linux ABI described 453 pvmfw verifies the guest kernel image (loaded by the VMM) by re-using tools and 455 kernel region (see `/config/kernel-{address,size}` described above) to contain [all …]
|